Tech Thoughts Daily Net News – July 28, 2012

Five-minute Facebook security checkup – In just a few minutes you can tweak the social network’s default privacy settings to ensure you’re sharing posts and photos only with the friends you intend to share them with.

Easy Ways to Clear Space on Your Laptop’s Hard Drive – Do you live with a thin-and-light laptop that has a small drive? Or just have a large drive that’s filled to overflowing? Here’s how to get some breathing room back.

Google Talk Users Lash out Over Major Outage – Google Talk, a desktop and mobile text and voice chat service used by many Google Gmail customers, suffered a widespread outage Thursday morning that the company says affected “a majority of users.”

How to skip Windows 8 and continue using Windows 7 – If you’re perfectly happy with Windows 7 and skeptical about Windows 8, I have good news for you. You’ve got seven more years before you have to give it up. Here are the facts, figures, and dates to know.

Tech Thoughts Daily Tech News 2

Google Failed to Delete All Unauthorized Street View Data – Google admitted to U.K. officials that it failed to delete all the unauthorized data collected by its Street View cars

Edit PDF documents with LibreOffice Draw – With LibreOffice Draw, you can edit basic PDFs without splurging for Adobe Acrobat or jumping through any hoops with add-ons.

How to extract images from Office documents – Pull images like blueprints or schematics from Office documents with the help of this easy-to-use application.

How to decide: should you buy the Nexus 7 or the Kindle Fire? – Back when I wrote for CNN, I was taught we had eight seconds to get the main point across. So, here goes. Buy the Nexus 7. Unless you’re a huge Amazon user. Then get the Fire. There you go. No beating around the bush. Just a simple answer. Or is it?

Linux Mint 13 KDE released: But does it live up to expectations? – Hot on the heels of its Xfce build, the final release of Linux Mint 13 KDE is now available for download. This is an iteration that a lot of people have been anxiously awaiting, because it combines a lot of good things in a single package.

Turn your old smartphone into a great media player – When it’s time for a new phone, don’t be so quick to recycle your old one. Most can be easily turned into dedicated media players that can make great additions to your home, workplace, or car. Here are some tips to make the most of them.


New Mac ‘Crisis’ Trojan Taps Into Webcam, More – Security researchers have discovered a new Mac Trojan, dubbed OSX/Crisis, which eavesdrops on unsuspecting users by intercepting communications like email and IMs.

More Than Half Of Major Banks Infected With Conficker, Zeus, Fake AV, Other Malware – Users who get hit with malware infections tend to be repeat offenders, and 18 of the 24 largest banks around the world suffer from infamous malware, such as Conficker, DNS Changer, Gameover Zeus, BlackHole Exploit Kit, and fake antivirus, according to new data.

Personal and financial information under attack – “The reason why criminals are focusing their attacks on stealing personal data is simple. It’s the sheer volume of people working from multiple devices that leaves them vulnerable to attacks,” said Rik Ferguson, director of security research and communication, Trend Micro. “While Trend Micro has been integral in working with authorities to break up a number of cybercriminal rings over the last year, these cybercriminals have acquired new techniques and tools from collaborating with one another to accelerate their ‘industry.’ The fact is: business is booming for cybercrime and everyone needs to take notice.”

Mahdi Malware Makers Push Anti-American Update – Spy malware, seemingly built by Iranians, gets update that searches for “USA” and “gov” on targeted machines, security researcher says at Black Hat.

Most users think content is more important than the device – “Protection from viruses, malware and other online threats remains as important as ever before. What’s new is that consumers are also seeking safe ways to store and synchronize content across their many devices, and also to share this content online, anywhere and anytime”, says Samu Konttinen, Executive VP, Customer and Market Operations, F-Secure.

Windows 8 Security Garners Praise at Black Hat – For years, hackers have had an easy time exploiting Windows heap memory manager. However, all that is going to change with Windows 8, according to new research released at Black Hat.

Company News:

Microsoft sets lowest price for paid apps at $1.49 for Windows 8 Store – The base price is higher than the 99 cents iOS and Android store customers are used to, but seven-day trial periods will be an option for paid apps. Prices can rise in 50-cent increments all the way up to $999.99. Developers can choose to release free apps, and support them with in-app purchases. Unlike other app stores, the Windows 8 will allow seven-day trial periods for users to test paid apps before purchasing them.

Broadcom introduces 5G WiFi combo chip for smartphones – With 3X faster speeds, consumers can download web content from a mobile device, and synch large files such as videos, in a fraction of the time it would take on a similar 802.11n device. Since 5G WiFi transfers the same volume of data at a much faster rate, devices enter low-power mode quickly and, as a result, are up to six times more power efficient than equivalent 802.11n solutions.

Apple buys fingerprint sensor firm AuthenTec for $356 million – Enterprise loves hardware that incorporate fingerprint readers, now Apple is in a position to add this feature to Macs and iOS devices.

Google Expands 3D Imagery to iPhone, iPad – Google Earth now supports 3D imagery on the new iPad, iPad 2, and iPhone 4S on Thursday, making the world as seen through an electronic screen a little more real.

Dell re-enters high-end Linux laptop market with Red Hat Enterprise Linux – Dell, which has and off and on relationship with desktop Linux is on again with a pair of new high-end RHEL laptops.

Webopedia Daily:

GIS – Geographic Information Systems – Short for Geographic Information Systems, tools used to gather, transform, manipulate, analyze, and produce information related to the surface of the Earth. This data may exist as maps, 3D virtual models, tables, and/or lists. GISs can be as complex as whole systems that use dedicated databases and workstations hooked up to a network, or as simple as “off-the-shelf” desktop software.

Off Topic (Sort of):

Hacker delves into secret warranty world – Nobody likes to read the tiny, legalese-ridden warranty statements that come with tech products. But a 17-year-old hacker at Defcon has been doing so, and has advice for consumers and companies alike.

Skype talks back to critics on security and privacy – Critics have been slamming Skype (and its corporate parent Microsoft) with insinuation that it’s taking shortcuts with its users’ privacy. In an unusually direct blog post, a top Skype spokesman labels the allegations false.

Snafu over pricing of Microsoft Surface highlights trouble with web rumors – Yesterday, the tech echo chamber went into a feeding frenzy over the discovery of a small Swedish web site that had posted prices for Microsoft’s Surface tablets. The story was bogus, but what does it say about how the tech press covers rumors?

Print a Smell on a Postcard – A concept device could let you take pictures and capture the smell on a postcard.

Court Throws Out Airport Bomb Tweet Conviction – Charges have been dropped against a Northern Ireland man who, in jest, sent a tweet threatening to blow up an airport two years ago.

Today’s Quote:

“He who builds a better mousetrap these days runs into material shortages, patent-infringement suits, work stoppages, collusive bidding, discount discrimination–and taxes.”

–      H. E. Martz

Today’s Free Downloads:

WinPatrol – Clean up your Taskbar, ActiveX, Brower, and Startup programs. WinPatrol monitors and exposes adware, keyloggers, spyware, worms, cookies, and other malicious software.

Recuva 1.43.623 – Recuva (pronounced “recover”) is a freeware Windows utility to restore files that have been accidentally deleted from your computer. This includes files emptied from the Recycle bin as well as images and other files that have been deleted by user error from digital camera memory cards or MP3 players. It will even bring back files that have been deleted from your iPod, or by bugs, crashes and viruses!



Filed under downloads, Internet Security Alerts, Tech Net News

8 responses to “Tech Thoughts Daily Net News – July 28, 2012

  1. Pingback: July 28, 2012 – — Get a Free Blog Here | Top Internet Security

  2. delenn13

    Heads up…

    Access Your Full History of Clipboard Items

    On any given day, you copy and paste so many items that you probably don’t even think about it. But just imagine how much more productive you’d be if you could copy and paste more than a single item to the Windows clipboard at a time! Clipstory gives you that exact functionality, and so much more.

    With Clipstory, every item you copy to the clipboard is saved in a history file. Later on, you can quickly cycle through your entire history of copied text, files, images, audio and binary data! Not only does Clipstory allow quick access to frequently used clips, you also have the ability to tag items, see extra details about each clip, and save clipped items to disk.

    But wait, it gets better! You can set up Clipstory to automatically save clipped items to folders based on their data type, even going as far as to instantly convert image files to your desired format!

    Clipstory PC Software with a 100% off Discount Coupon Code – Access Your Full History of Clipboard Items

    And GGOTD has a game if you want to deal with their asinine new wrapper..

    Game Giveaway of the Day – Football Live 1.01

  3. delenn13 2012-07-29 13:00) has another Sega Classic from 08/14/1989.

    Athena, the daughter of Zeus, has been captured by the wicked Neff, God of the Underworld, and is being held captive.

    Summoned from the dead by Zeus himself, it is up to you now to clear five rounds of underlings before taking on Neff, in what promises to be the most gruelling of challenges.
    Key Features:

    > A classic with good gameplay, great character design, and quintessential boss battles.

    > Multiple enemy types: slow moving, shambling zombies, demons, two headed wolves, limbless bouncing frogs, strange weird half-chicken lizard monsters, etc.

    > Various powers depending on the level you are.

    Download Altered Beast – PC Game

    • delenn13

      Hi Bill,

      Please remove any reference to the East-Tec DisposeSecure program. I just got an email from a friend who told me the key would not work. Mine worked but maybe because I had an earlier version?? Have no idea. But what is even stranger….is WHY do they have any of this on THEIR website? Are they data mining the emails? What is going on?

      “Thank you for your interest.

      You need to enter the key into the version you have obtained from the magazine, not the latest version form our website.
      Please try again to insert it in the exe obtained from the magazine and let us know if it works.

      Mugur Iuhas
      EAST Technologies”

      • Hey Delenn13,

        East-Tec is a reputable company. I’ve deleted that reference but, “friends” who can’t seem to plug in a key, license code, whatever, is so common that I generally just take it for what it’s worth. Some people couldn’t follow a bouncing ball if you tied their eyes to it with a string. Not copying and pasting the key, is the most common error.

        As for data mining – you can be sure that all companies data mine emails. I’ve seen email remarks of mine posted under “Reviews or “Testimonials”, on more than a few company sites. Unless you use the “confidentiality” clause in an email, You have no control over the use of the remarks. Most of the companies I deal with generally include this confidentiality clause.



    • Hey Delenn13,

      “A slow moving, shambling zombie” – kinda describes me on a Sunday morning. Will have to checkout this game. 🙂



  4. Pingback: Five-minute Facebook Security Checkup | Paul's Internet Security Blog